236 resultados para Public Security.
Resumo:
The aim of this exploratory study was to gain an insight into Asian and Western public relations practices by investigating them through job advertisements and thus reflecting on what organisations expect from the public relations professionals. Grunig's (1984) four models of public relations and the concept of relationships management were used as the foundation for this study. Australia was used to represent the Western region and India was used to represent the Asian region. Sample sets of public relations recruitment advertisements from both countries were examined against Grunig's one-way communication, two-way communication and relationship management attributes.
Resumo:
Exposure of the skin to sunlight can cause skin cancer and is also necessary for cutaneous vitamin D production. Media reports have highlighted the purported health benefits of vitamin D. Our aim was to examine attitudes and behaviours related to sun protection and vitamin D. A cross-sectional study of 2,001 residents in Queensland, Australia aged 20-70 years was undertaken. Information collected included: skin cancer risk factors; perceptions about levels of sun exposure required to maintain vitamin D; belief that sun protection increases risk of vitamin D deficiency; intention, and actual change in sun protection practices for adults and children. Multivariate models examined predictors of attitudinal and behavioural change. One-third (32%) believed a fair-skinned adult, and 31% thought a child required at least 30 minutes per day in summer sun to maintain vitamin D levels. Reductions in sun protection were reported by 21% of adults and 14% of children. Factors associated with belief that sun protection may result in not obtaining enough vitamin D included aged ≥ 60 years (OR=1.35, 95% CI 1.09-1.66) and having skin that tanned easily (OR=1.96, 95% CI 1.38-2.78). Participants from low income households, and those who frequently used sun protective clothing were more likely to have reduced sun protection practices (OR=1.33, 95% CI 1.10-1.73 and OR=1.73, 95% CI 1.36-2.20, respectively). This study provides evidence of reductions in sun protection practices in a population living in a high UV environment. There is an urgent need to re-focus messages regarding sun exposure and for continued sun protection practices.
Resumo:
This thesis presents a case study of the Special Broadcasting Service documenting the broadcasting challenges posed by user-generated content initiatives and the work-place approach to strategies for participation. Using the action research method, the project findings reveal that limitations to resources and funding determined the scope for innovation and that the practice of executive editorial control over content was considered fundamental to fulfilling the responsibilities of the public service mandate. Media workers were overwhelmingly positive about the enhanced productive capabilities of the audience and willing to facilitate moderated interactions, however the effectiveness of these initiatives differed according to the level of skills required. This thesis demonstrates how participatory initiatives can enhance aspects of the public service remit relating to cultural diversity, the servicing of niche interests, and broader social representation, and help reinvigorate the relevance of public service broadcasting in the digitalised media sphere.
Resumo:
Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.
Resumo:
Many jurisdictions have developed mature infrastructures, both administratively and legislatively, to promote competition. Substantial funds have been expended to monitor activities that are anticompetitive and many jurisdictions also have adopted a form of "Cartel Leniency Program", first developed by the US Federal Trade Commission, to assist in cartel detection. Further, some jurisdictions are now criminalizing cartel behaviour so that cartel participants can be held criminally liable with substantial custodial penalties imposed. Notwithstanding these multijurisdictional approaches, a new form of possibly anticompetitive behaviour is looming. Synergistic monopolies („synopolies‟) involve not competitors within a horizontal market but complimentors within separate vertical markets. Where two complimentary corporations are monopolists in their own market they can, through various technologies, assist each other to expand their respective monopolies thus creating a barrier to new entrants and/or blocking existing participants from further participation in that market. The nature of the technologies involved means that it is easy for this potentially anti-competitive activity to enter and affect the global marketplace. Competition regulators need to be aware of this potential for abuse and ensure that their respective competition frameworks appropriately address this activity. This paper discusses how new technologies can be used to create a synopoly.
Resumo:
Protection of “critical infrastructure” has become a major issue for govern- ments worldwide. Yet in Australia, as in many other countries, including the United States, an estimated 90% of critical infrastructure is privately owned or operated commercially – in other words, critical infrastructure protection is not the exclusive domain of government. As a result, information sharing between government and the private sector has become a vitally important component of effective risk management. However, establishing effective arrangements of this kind between the public and private sector needs to take account of existing regimes of access and public disclosure which relate to government-held documents; in particular, that which is established by freedom of information (FOI) legislation. This article examines the extent to which the current Commonwealth FOI regime is likely to act as an impediment to the private sector operators of critical infrastructure participat- ing in government-operated information sharing arrangements. By examining developments in other jurisdictions, principally the United States, the article considers whether amendments to the current Australian FOI regime are necessary to ensure effective participation, consistent with the underlying object and purpose of FOI.
Resumo:
Journalists in the “new media” era confront important questions as to whether, or how, they adapt their professional practices to a new interactive on-line form that allows citizens to become involved in the news-making process. This paper seeks to re-establish the relevance of traditional journalism practices in the modern era and suggests that they will remain very much a part of the “new journalism” beyond the digital divide. It does so through examining how broadcast journalism interviews challenge authorities in the “public interest”, and suggests, in conclusion, that such practices remain undiminished by the technical, and accompanying social, changes that are driving the “new media”.